نتایج جستجو برای: attacks

تعداد نتایج: 57358  

The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...

Journal: :The Lancet 1889

Journal: :Procedia Manufacturing 2015

Journal: :Communications of the ACM 2020

Today governments face a threat by cyber attacks capable of disrupting communicative, economic and vital services that cause severe damages and losses. It has been years that Islamic republic of Iran benefits from cyberspace in different military and civilian sectors. Sensitive national centers such as nuclear facilities and Ministry of Oil have been targeted by individuals, groups and governme...

An AES-like lightweight block cipher, namely Zorro, was proposed in CHES 2013. While it has a 16-byte state, it uses only 4 S-Boxes per round. This weak nonlinearity was widely criticized, insofar as it has been directly exploited in all the attacks on Zorro reported by now, including the weak key, reduced round, and even full round attacks. In this paper, using some properties discovered by Wa...

, ,

Abstract Background: One of the major challenges in road safety is the occurrence of sudden disability attacks while driving. An important point about the occupational health of drivers who have patients who have the potential for sudden disability attacks is to estimate the likelihood and consequences of the attacks. In other words, how likely is an accident to follow a sudden disability while...

Journal: :International Journal of Computer Applications Technology and Research 2013

Journal: :Medical Journal of Clinical Trials & Case Studies 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید